Korean Cybersecurity Framework 23 Sep 2009

advertisement
Korean Cybersecurity Framework
23 Sep 2009
Hyderabad, India
2009 ITU Regional Cybersecurity
Forum for Asia‐Pacific
Terrence Park
KrCERT/CC
Korea Internet & Security Agency
Conten
t
Cybersecurity Constituency in Korea
Code of Conduct in Korea
Evolution of Cyber Incident
National Cybersecurity Framework
KrCERT/CC Activity
7.7 DDoS
Cybersecurity Constituency in Korea
National Cybersecurity Strategy Council
Private Sector
Public Sector
Military
(Korea Communications Commission)
(National Intelligence Service)
(MND)
Population : 48 million, Internet User : 35 million
Public Officer : 610K
PC : 30 million, Server : 5.7 million
Local Officer : 270K
Broadband Subscriber(Jun 2009) : 16 million
Public Org : 250K Officers
IPv4 (Jun 2009) : 73 million
PC : 1 million (inferred)
VoIP Subscriber(May 2009) : 4 million
Server : 15K (inferred)
Ministry of Public Administration and Security
Military Officer,
Server & PC
IPTV Subscriber(Jul 2009) : 0.5 million
Private Corp.
User
Gov website
Public Org
Financial
IPTV, VoIP
Portal
K I N X
Internet
Military Websites
Code of Conduct Korea
Relevant Act : (Korea Communications Commission) The Act on Promotion of Information & Communication Network Utilization and Information Protection, etc.
Article 48‐
Article 48‐2 (Response, etc. to Infringement Accident)
(1) The Chairman of Korea Communications Commission shall perform the task falling under each of the following subparagraphs to (1) The Chairman of Korea Communications Commission shall perform the task falling under each of the following subparagraphs to properly cope with any infringement accident and may, if necessary, get the Security Agency to perform the task, in whole or in part: properly cope with any infringement accident and may, if necessary, get the Security Agency to perform the task, in whole or in part: 1. The collection and dissemination of information on infringement accident; 1. The collection and dissemination of information on infringement accident; 2. The forecast and alert of infringement accident; 3. Emergency measures against infringement accident
; and 3. Emergency measures against infringement accident; and 4. Other measures prescribed by the Presidential Decree to cope with infringement accident. 4. Other measures prescribed by the Presidential Decree to cope with infringement accident. (2) The person falling under each of the following subparagraphs shall furnish information pertaining to infringement accident, including the statistics of infringement accident by type, the statistics of traffic volume in the relevant information and including the statistics of infringement accident by type, the statistics of traffic volume in the relevant information and communications networks and the statistics of uses by connection channel, to the Minister of Information and Communication or the Security Agency under the conditions as prescribed by the Ordinance of the Korea Communications Commission :
the Security Agency under the conditions as prescribed by the Ordinance of the Korea Communications Commission :
1. The provider of major information and communications services; 1. The provider of major information and communications services; 2. The business operator of agglomerated information and communications facilities; and 2. The business operator of agglomerated information and communications facilities; and 3. Other person who is prescribed by the Presidential Decree as the operator of the information and communications networks. 3. Other person who is prescribed by the Presidential Decree as the operator of the information and communications networks. Article 48‐
Article 48‐3 (Report on Infringement Accident, etc.)
(1) The person falling under each of the following subparagraphs shall, when any infringement accident occurs or he finds signs of shall, when any infringement accident occurs or he finds signs of any infringement accident, report without delay the occurrence of such infringement accident or his finding of such signs to The
any infringement accident, report without delay the occurrence of such infringement accident or his finding of such signs to The
Chairman of Communications Commission or the Security Agency. In this case, if any notice is served in accordance with Article 13 this case, if any notice is served in accordance with Article 13 ed (1) of the Act on the Protection of Information and Communications Infrastructure, such notice shall be deemed the report referr
(1) of the Act on the Protection of Information and Communications Infrastructure, such notice shall be deemed the report referred to in the former part: 1. The provider of information and communications services; 2. The business operator of agglomerated information and communications facilities; and 2. The business operator of agglomerated information and communications facilities; and 3. Other person who is prescribed by the Presidential Decree as the operator of the information and communications networks.
3. Other person who is prescribed by the Presidential Decree as the operator of the information and communications networks.
Evolution of Cyber Incident
▶1998
Security
Threat
Type
1999▶2003
BOT, BotNet
Hacking, virus
DDos
DoS
Internet Worm
Spyware, Crimeware
1.25
Attack
Tech
nique
Phishing
Security Threat Paradigm
7.7
Increase of personal
credential leakage
Increase of online
financial crime
Organized Crime (financial)
Distributed attack
Independent attack
Focused/smarter
Embedded,
automatic
Integrated Integrated security management
security management
Counter
measure
2004▶Present
Point Security Solution
Point Security Solution
(IDS, F/W)
(IDS, F/W)
Distributed detection
Distributed detection
/analysis
/analysis
Security trend analysis
Security trend analysis
Social engineering
Intelligent security system
Intelligent security system
Increase of industrial spy
/internal breach
Increase of cross‐border
hacking activity
Threat management framework
Threat management framework
Coop orgs/info sharing
Coop orgs/info sharing
Policy/managerial security
Policy/managerial security
DDoS by BOT(increase
of malicious traffic)
National Cybersecurity Framework
National Cyber Crisis Framework
President
Presidential Directive,
National Cybersecurity
Regulation
National Crisis
Situation Center
National Cybersecurity
Strategy Council
(Chair : Head of NIS)
National Cybersecurity
Planning Council
nd
(Chair : 2 Head of NIS)
Recovery Support
Joint Investigation
*public : NIS, MND, KCC
‐ Prosecutor, Police join when needed
*private : experts from
industry/academic/research
*public : NIS, MND, KCC
*private : experts from industry/academic/research
Ministry of National Defense
National Intelligence Service
Korea Communications Commission
Defense Security Command
KNCERT/CC
KrCERT/CC
Military Area/each unit
Critical Infrastructures in
Government/public sector
Critical Infrastructures
in private sector
Cybersecurity Crisis Management Standard Manual (Oct 2008)
National Cybersecurity Framework
National Cyber Crisis Framework for Private Sector
National Crisis
Situation Center
Korea Communications
Commission
Emergency Headquarter
③ info sharing
National Intelligence Service,
Ministry of Defense
Network Security Team
Public‐Private
Joint Recovery Support
Public‐Private
Joint Investigation
④ response guide
⑤ countermeasure
Critical Infrastructures
Prosecutor, Police
② preliminary action & report
① report & info feed
ISP/IDC, Security Vendors
Corporations, Users
Cybersecurity Crisis Response Manual for private sector (Jan 2009)
National Cybersecurity Framework
Crisis Warning Issue Framework
Warning level
National Crisis
Situation Center
Critical
‐ issuer : KCC
report direction
NIS
Severe
KCC
MND
‐ issuer : KCC
report direction
General User
Substantial
President
‐ issuer : KrCERT/CC
Network Admin
ISP
Report
IDC
Alert
AV vendor
Advisory
ISAC
MSSP
Mobile Telco
Critical
Leader
Infrastructure
NCSC (NIS)
report
Head of KrCERT/CC
‐ issuer : KrCERT/CC
… Response Leader …
report
MND
Prosecutor/Police
Moderate
Report
(2nd Eval)
Info‐
Info‐share
report
KrCERT/CC
Cause of Issue
Leader
report
1st Eval on
Abnormality
Normal Response
Entire Internet Breakdown
Emergency Headquarter Formed,
Public‐
Public‐Private Joint Analysis Team Activated,
Block Certain Services
Mass Damage on Multiple ISPs and Critical Infrastructures
Possible Control on Certain Service,
Public Awareness (TV),
Emergency duty system activated
Partial Internet Service Breakdown
Damage Status Report,
Emergency duty system activated
Increase of Incidents Public Awareness,
and Possible Emergency duty system Damage
activated
※ Common Response for All Levels
‐ Discuss on warning with NIS, MND and report to Blue House
‐ Cause Analysis, Spread Prevention, Recovery Support
National Cybersecurity Framework
National Cybersecurity Framework
Local Cooperation Framework
Private Sector:
ISP, IDC, etc
Public Sector:
Government, Public Orgs
National Crisis
Situation Center
Incident Escalation & Info Sharing
Education support
Internet Crime related Support
Info‐sharing
Info‐sharing
Onsite Joint Investigation
Incident Escalation for Serious Crime
Technical Documents
Hacking Analysis report
ISP/IDC/SO
KrCERT/CC Activity
Detection
Detection
Analysis
Analysis
ISP/ESM
Remote
Agent
Dissemination & Support
Dissemination & Support
Mail
Malware
FAX
Info‐providing Org,
Info‐providing Org,
Hot Liners
Hot Liners
ISP/IDC,
ISP/IDC,
Mobile Provider,
Mobile Provider,
Security/AV
Security/AV
Vendors
Vendors
Traffic Monitoring,
User Protection,
Malicious Traffic Block,
Develop Vaccine,
Incident Reports
IDS/Firewall
Email feed
Vulnerabi
lity
SMS
Private Corp.
Private Corp.
(Portal, B2B, B2C)
(Portal, B2B, B2C)
Attack Port Block,
Security Patch,
Log Analysis,
Damage Recovery
General User
General User
Security Patch,
Damage Recovery
Broadcasting/
Broadcasting/
Media
Media
Public Awareness
Web.
S/W,H/W
Incident Reports
AntiVirus
Messen
ger
User
TRS
Intelligence,
Intelligence,
Military,
Military,
Police
Police
Info‐sharing
7.7 DDoS
What is different?
Zombies do not act on real‐time basis, no herder needed
Attack
Crafted to act based on pre‐designed scenario
Damages fixed drive on certain time
C&C blocking does not work
Response
Clearing possible only when entire zombies are cured
Limited countermeasure in network aspect
7.7 DDoS
Attack & Response Flow
1st DDoS attack
(1900)
2nd DDoS attack
(1800)
3rd DDoS attack
(1800)
HDD attack
(0000)
DDoS attack ended
(1800)
Malware host
info secured
HDD damage
info secured
external
HDD damage
info secured
7/7
DDoS malware
sample secured
internal
7/9
7/8
DDoS malware
sample secured
Forward sample
to AV vendor
Block
Malware
Host
Issue Warning
‘Substantial’
(0240)
7/10
7/11
7/12
Block HDD
damage hosts
Forward sample
to AV vendor
Block
Malware
Host
Initiate Public Service
for HDD damage
Block HDD
damage hosts
Alert on HDD
Destruction
(2330)
7/15
Block HDD
damage hosts
Block
Malware
Host
Warning level
down to Moderate
(1500)
7.7 DDoS
Attack & Response Timeline
Attack detected by
DDoS Response System
DDoS attack occurred (7 Jul)
DDoS Attack
Terminated
Request & Secure
Zombies (7 Jul)
Attack Log & IP
Secured (7 Jul)
(KrCERT/CC, Auction, Naver)
Analyze zombie
(remote & onsite)
Handling Entire zombies
(15 Jul)
Malware Analysis
Attacker
Confirmed there’s no C&C
DDoS malware
Collected (7 Jul)
Thank you
twpark@krcert.or.kr
Download